1 Introduction CS 303 Algorithmic Number Theory and Cryptography Jeremy R. Johnson.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Fubswrjudskb Frxuvh qxpehu: / Lqvwuxfwru:Lyrqd Ehcdnryd Wrgdb’v Wrslfv: 1.Orjlvwlfv: -Fodvv olvw -Vboodexv 2. Wkh Pdwk 3. Zkdw lv Fubswrjudskb.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Lecture 2.1: Private Key Cryptography -- I CS 436/636/736 Spring 2013 Nitesh Saxena.
DTTF/NB479: Jouspevdujpo up Dszquphsbqiz Nbuu Cpvufmm G-224 y8534 (It should now be obvious whether or.
Announcements: Class is cancelled Thurs+Fri while I’m at the SIGCSE conference Class is cancelled Thurs+Fri while I’m at the SIGCSE conference Assignment.
CMSC 414 Computer and Network Security Lecture 2 Jonathan Katz.
Classic Cryptography: Caesar Wenyuan Xu Department of Computer Science and Engineering University of South Carolina 2008.
CS470, A.SelcukIntroduction1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
Lecture 1 Overview.
CPSC CPSC 3730 Cryptography Chapter 2 Classical Encryption Techniques.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Computer Security CS 426 Lecture 3
Chapter 2 – Classical Encryption Techniques
DTTF/NB479: Jouspevdujpo up Dszquphsbqiz Nbuu Cpvufmm G-222 y8534 (It should now be obvious whether or.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
3.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Traditional Symmetric-Key Ciphers.
Cryptography Week-6.
Cryptography Lecture 1: Introduction Piotr Faliszewski.
CIS 5371 Cryptography Introduction.
Security in Computing Cryptography (Introduction) Derived from Greek words: ‘Kruptos’ (hidden) and ‘graphein’ (writing.
Introduction to Information Security Chapter II : Classical Ciphers.
Confusion and Diffusion1 Ref: William Stallings, Cryptography and Network Security, 3rd Edition, Prentice Hall, 2003.
Lec. 5 : History of Cryptologic Research II
Introduction to Computer and Network Security Iliano Cervesato 24 August 2008 – Introduction to Cryptography.
Cryptography and Network Security (CS435) Part Two (Classic Encryption Techniques)
Network Security Section 1: Introduction to security.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Classical Cryptography.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Tyepmg Pic Gvctxskvetlc April 25, The Caesar Cipher (Suetonius) “If Caesar had anything confidential to say, he wrote it in cipher, that is,
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
Symmetric-Key Cryptography
Announcements: Please pass in Assignment 1 now. Please pass in Assignment 1 now. Assignment 2 posted (when due?) Assignment 2 posted (when due?)Questions?
Cryptography Lecture 2: Classic Ciphers Piotr Faliszewski.
THE SCIENCE, MATHEMATICS, AND ART OF PRIVACY BASIC STUFF 1 CRYPTOGRAPHY.
Part 9, Basic Cryptography 1. Introduction A cryptosystem is a tuple: ( M,K,C, E,D) where M is the set of plaintexts K the set of keys C the set of ciphertexts.
Cryptography Part 1: Classical Ciphers Jerzy Wojdyło May 4, 2001.
Cryptography (Traditional Ciphers)
Part 9, Basic Cryptography 1. Introduction A cryptosystem is a tuple: ( M,K,C, E,D) where M is the set of plaintexts K the set of keys C the set of ciphertexts.
CRYPTANALYSIS OF STREAM CIPHER Bimal K Roy Cryptology Research Group Indian Statistical Institute Kolkata.
Traditional Symmetric-Key Ciphers
Security in Computing Cryptography (Traditional Ciphers)
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
CSCI 391: Practical Cryptology Substitution Monoalphabetic Ciphers.
Information Security Assignment- 01  What do you know about standards for information Security?  Suppose you are working in a Information Security department.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
1 Thinking the Impossible “Modern Cryptography” Jeremy R. Johnson.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Substitution Ciphers Reference –Matt Bishop, Computer Security, Addison Wesley, 2003.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
Thinking the Impossible “Modern Cryptography”
Introduction CS 303 Algorithmic Number Theory and Cryptography
Computer Security Chapter Two
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

1 Introduction CS 303 Algorithmic Number Theory and Cryptography Jeremy R. Johnson

KHOOR 2

HELLO 3

4 Introduction to Classical Cryptography Objective: Introduction to Cryptography and Cryptanalysis –Shift Cipher –Substitution Cipher –Attacks and adversaries –Frequency analysis

5 Classical Cryptography Basic problem: Secure communication over an insecure channel Solution: private key encryption –m  E (k,m) = c  D (k,c) = m Shannon provided a rigorous theory of perfect secrecy based on information theory –Adversary has unlimited computational resources, but key must be as long as message

6 Communication Scenario AliceBob Eve EncryptDecrypt Encryption key Decryption key ciphertext plainrtext

7 Shift Cipher hello all hail ceasar If he had anything confidential to say, he wrote it in cipher, that is, by so changing the order of the letters of the alphabet, that not a word could be made out. If anyone wishes to decipher these, and get at their meaning, he must substitute the fourth letter of the alphabet, namely D, for A, and so with the others. — Suetonius, Life of Julius Caesar 56

8 Shift Cipher KHOOR DOO KDLO FHDVDU a b c d e f g h i j k l m n o p q r s t u v w x y z D E F G H I J K L M N O P Q R S T U V W X Y Z A B C Key = 3 m  E (k,m) = c = m+k mod 26 c  D (k,c) = c-k mod 26

Possible Attacks Kerchoff’s Principle 1.Ciphertext only 2.Known plaintext 3.Chosen plaintext 4.Chosen ciphertext 9

Cryptanalysis of Shift Ciphers Number of keys = size of alphabet 1.Ciphertext only 1.Brute force 2.Look for most frequently occurring symbol 2.Known plaintext 1.m + k = c (mod 26) 3.Chosen plaintext k = c (mod 26) 4.Chosen ciphertext 1.m + k = 1 (mod 26) 10

11 Frequency Analysis en.wikipedia.org/wiki/Frequency_analysis_(cryptanalysis) scottbryce.com/cryptograms

War and Peace 12 3,223,402 Characters

freq.pl infile = file(filename,'r') freq = {} count = 0 for c in string.ascii_lowercase: freq[c] = 0 for line in infile: for c in line.lower(): if c.isalpha(): freq[c] = freq[c] + 1 count = count + 1 keys = freq.keys() keys.sort() for c in keys: print "freq[" + c + "] = ",float(freq[c])/count 13

14 Substitution Cipher NYVVZ JVV NJSV RYJDJC a b c d e f g h i j k l m n o p q r s t u v w x y z J E R M Y O H N S T U V W X Z A B C D F G I K L P Q Key – bijection from {0..25}  {0..25}: i   (i) m  E (k,m) = c =  (m) c  D (k,c) =  -1 (c)

Cryptanalysis of Substitution Ciphers Number of keys = n! where n is the size of the alphabet 1.Ciphertext only 1.Brute force (too expensive) 2.Frequency analysis 2.Known plaintext 1.m   (i) = c, for known (m,c). Partial permutation 3.Chosen plaintext 1.m   (i) = c, m = 0..n-1 4.Chosen ciphertext 1.  -1 (c)  m, c = 0..n-1 15

16 One Time Pad Pad = b 1  b n  {0,1}* chosen randomly m = m 1  m n –E (Pad,m) = c = m  Pad –D (Pad,c) = c  Pad = (m  Pad)  Pad = m  m,c Pr Pad [ E (Pad,m) = c] = 1/2 n –No information gained from seeing c –However, E (Pad,m)  E (Pad,m’) = m  m’